Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2010 43rd Hawaii International Conference on System Sciences 2010
DOI: 10.1109/hicss.2010.35
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Game Theory as Applied to Network Security

Abstract: Network security is a complex and challenging problem.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
217
0
3

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 375 publications
(231 citation statements)
references
References 23 publications
1
217
0
3
Order By: Relevance
“…In previous work [19] game play method of finding the intruder were proposed based on the response and recovery method. The problem in that existing work is if the real header is misplayed the game in wrong method means the entire client under the network cannot access the data, so they can suffer the access of data, so it will be the great drawback from the existing work and study the various work from [20].…”
Section: Problem Definitionmentioning
confidence: 99%
“…In previous work [19] game play method of finding the intruder were proposed based on the response and recovery method. The problem in that existing work is if the real header is misplayed the game in wrong method means the entire client under the network cannot access the data, so they can suffer the access of data, so it will be the great drawback from the existing work and study the various work from [20].…”
Section: Problem Definitionmentioning
confidence: 99%
“…26. The strategic component of attributing cyberattacks has been studied in the context of single attacks against specific systems using game theory (27)(28)(29)(30), but these models do not account for the larger sociopolitical landscape. This broader context has been studied qualitatively using a variety of models (15,31,32).…”
Section: Significancementioning
confidence: 99%
“…The game is non-cooperative, static, imperfect, complete information, and non-constant-sum game. There is no cooperation between the players (network security games fall under the category of non-cooperative games, as there is no cooperation between attacker and defender [22]). As a static game, each player has a pre-computed move list (each move denoted as a strategy) from which the best move is chosen to maximise their personal benefit.…”
Section: Game Theoretical Cost Benefit Analysismentioning
confidence: 99%
“…Traditional network security solutions lack a macro-level quantitative decision framework [22]. Various researchers have focused their work on utilising game theory in order to provide a holistic solution [15,31,12,7].…”
Section: Game Theory In Security and Malware Analysismentioning
confidence: 99%
See 1 more Smart Citation